Lecture02 - CSE 484(Winter 2008 Computer Security and...

This preview shows page 1 - 5 out of 8 pages.

Tadayoshi Kohno CSE 484 (Winter 2008) Computer Security and Privacy Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials ... / network Confidentiality (Privacy) Confidentiality is concealment of information Eavesdropping, packet sniffing, illegal copying network Integrity Integrity is prevention of unauthorized changes Intercept messages, tamper, release again
Image of page 1

Subscribe to view the full document.

network Authenticity Authenticity is identification and assurance of origin of information Variant of integrity Unauthorized assumption of another’s identity network Availability Availability is ability to use information or resources desired Overwhelm or crash servers, disrupt infrastructure Case Study: Electronic Voting Popular replacement to traditional paper ballots si.edu Pre-Election Ballot definition file Pre-election: Poll workers load “ballot definition files” on voting machine. Poll worker
Image of page 2
Active Voting Voter token Voter token Interactively vote Ballot definition file Active voting: Voters obtain single-use tokens from poll workers. Voters use tokens to active machines and vote. Voter Poll worker Active Voting Encrypted votes Voter token Voter token Interactively vote Ballot definition file Active voting: Votes encrypted and stored. Voter token canceled. Voter Poll worker Post-Election Voter token Tabulator Voter token Interactively vote Ballot definition file Post-election: Stored votes transported to tabulation center. Encrypted votes Recorded votes Voter Poll worker E-Voting Functionality (Simplified) Functionality goals: Easy to use People should be able to cast votes easily, in their own language or with headphones for accessibility Election official should be able to efficiently tabulate votes Election officials should be able to do a recount if necessary
Image of page 3

Subscribe to view the full document.

E-Voting Security (Simplified) Confidentiality Adversary should not be able to figure out how voters vote Integrity Adversary should not be able to tamper with the election outcome – By changing votes – By denying voters the right to vote
Image of page 4
Image of page 5

{[ snackBarMessage ]}

Get FREE access by uploading your study materials

Upload your study materials now and get free access to over 25 million documents.

Upload now for FREE access Or pay now for instant access
Christopher Reinemann
"Before using Course Hero my grade was at 78%. By the end of the semester my grade was at 90%. I could not have done it without all the class material I found."
— Christopher R., University of Rhode Island '15, Course Hero Intern

Ask a question for free

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern